Description
Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users with tag-editing permissions could edit and create synonyms for tags hidden in restricted tag groups, even if they lacked visibility into those tags. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Published: 2026-03-20
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Tag Modification
Action: Patch
AI Analysis

Impact

The vulnerability allows users with tag‑editing permissions to edit or synonymize tags that are hidden within restricted tag groups, even when those users cannot see the tags. This undermines the intended visibility restrictions and could enable malicious users to re‑categorize or otherwise manipulate content in a way that bypasses moderation controls. The compromise is limited to the integrity of tag data and the integrity of content classification, and the CVSS score of 3.5 reflects a moderate impact.

Affected Systems

All installations of the Discourse forum software running the 2026.3.0 through the most recent 2026.3.0‑latest.1 build, or the 2026.2.1 and 2026.1.2 releases are affected. Affected releases can be identified by their version numbers. The patch is included in the 2026.3.0‑latest.1 build and the corresponding 2026.2.1 and 2026.1.2 releases.

Risk and Exploitability

With a CVSS score of 3.5, the vulnerability is considered moderate. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild, and the issue is not listed in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog. An attacker only needs a legitimate account that has been granted tag‑editing privileges; once that permission is available, the attacker can modify hidden tags without needing additional authentication or system-level access. The exploitation path is straightforward once the privilege is in place, but the overall risk remains low due to the specialized role required for the attack.

Generated by OpenCVE AI on March 24, 2026 at 21:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Discourse 2026.3.0‑latest.1, 2026.2.1, or 2026.1.2, which contain the patch for this issue.
  • Restrict tag‑editing permissions to trusted users and the minimum number of individuals required for moderation tasks.
  • Verify that hidden tags remain inaccessible to users without explicit permission after the upgrade.
  • Monitor tag usage logs for unusual activity or unauthorized edits using your forum's audit logs or monitoring tools.

Generated by OpenCVE AI on March 24, 2026 at 21:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
cpe:2.3:a:discourse:discourse:2026.3.0:*:*:*:latest:*:*:*

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Discourse
Discourse discourse
Vendors & Products Discourse
Discourse discourse

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users with tag-editing permissions could edit and create synonyms for tags hidden in restricted tag groups, even if they lacked visibility into those tags. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available.
Title Discourse users can edit or synonymize hidden tags they can't see
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

Discourse Discourse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T15:30:29.255Z

Reserved: 2026-03-19T18:45:22.433Z

Link: CVE-2026-33426

cve-icon Vulnrichment

Updated: 2026-03-24T15:30:20.400Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T00:16:27.170

Modified: 2026-03-24T19:56:39.223

Link: CVE-2026-33426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:33:47Z

Weaknesses